Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.

THIS MONTH ON SEARCHSECURITY.COM

Technical Guide: Vulnerability scanning with NessusLearn how to use Nessus in the enterprise. Our expert takes you through the process step-by-step, from implementing and configuring the open source vulnerability scanner to building an enterprise reporting system. AVAILABLE JAN. 24, 2006

Security Wire Weekly Podcasts: News when you want it Security Wire Weekly is an audio broadcast featuring the latest security news. Produced by SearchSecurity.com's award-winning news team, you can listen each week on your PC or favorite mobile device. LISTEN TO OUR PODCASTSWebcast: Securing VoIP: An insider's look at the tools and tacticsThis webcast has been cancelled. We apologize for any inconvenience this may have caused.

Don't Spring a Leak Whether employees are acting maliciously or just carelessly, insiders account for the majority of customer data and intellectual property breaches. In our January cover story, we explored technology options for keeping confidential inside information secure. Now, we zero in on a new breed of host-based content monitoring tools that monitors individual machines to ensure that employee behavior adheres to corporate security policy. Join us for a webcast on Jan. 19 at noon EST to see how these products work. You'll learn how they assess where confidential information resides, prevent confidential information from leaving the network and can be centrally managed. (The webcast is available on demand after it debuts live.)
>>PREREGISTER HERE

Peak of Security Internet Explorer's poor reputation for security has motivated many to migrate to other browsers. But IE 7.0, now in beta, promises to stave off cross-site scripting and attacks that exploit URL parsing, improve control over ActiveX, and add an antiphishing blacklist. This month, we pitted IE's new security features against its chief browser competitors, Netscape and Firefox. Now, read about the security features in Opera, another contender in the browser wars.
>>CLICK TO READ THIS TIP

Mining Netflow Netflow data can be used to discover all sorts of harmful traffic, including spam Trojans in e-mail traffic, compromises on a firewalled server cluster, spyware infestation due to outbound traffic, and more. In
Information Security magazine, you saw how to mine Netflow data to create homegrown anomaly detection. Now arm yourself with more tactics for detecting and preventing intrusions with SearchSecurity.com's learning guide.
>>CLICK TO GET THIS GUIDE

PING: Marcus Sachs In an interview with
Information Security magazine, Marcus Sachs, a deputy director in SRI's Computer Science Laboratory, explains what it means to support SRI's Washington D.C. operations of the U.S. Department of Homeland Security's Cyber Security R&D Center, and how public and private enterprises play an important role in the process.
>>CLICK TO READ THE INTERVIEW

E-Handbook

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy